Analysis
-
max time kernel
870s -
max time network
846s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
LDPlayer9_ens_1252_ld.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LDPlayer9_ens_1252_ld.exe
Resource
win10v2004-20250314-en
General
-
Target
LDPlayer9_ens_1252_ld.exe
-
Size
2.1MB
-
MD5
2b259cd02570e0d7103c70fe9a9e4d17
-
SHA1
035fe918c59274c1fc662e7d88d0d92d1150fa19
-
SHA256
500cd8d0e8d7eb3cf7da63dd93978bf36a07fdc6b5a844de30cf84ccb38eedc4
-
SHA512
2547a8b631ca07270668741612a8a0d3935008a98ab538f6a14fb1cf3e8d2d82ae7bbe9fe22a495b32ee16b038aaa268b2750ed42705fbf6d080249279cdcb27
-
SSDEEP
24576:Ezvv2Jddh0hXxwQNBH5ffUX5zAEefc5Urz5Eo7zrrdXbETyLAyNBN/8LcpmZQ4J/:22e1iify35cdrrFJAWb/8amDe8hSSw0r
Malware Config
Signatures
-
Guerrilla
Guerrilla is an Android malware used by the Lemon Group threat actor.
-
Guerrilla family
-
Guerrilla payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002426e-298.dat family_guerrilla -
Otpstealer
Otpstealer is an Android SMS Stealer that targets OTP first seen in February 2022.
-
Otpstealer family
-
Otpstealer payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002426e-298.dat family_otpstealer -
Creates new service(s) 2 TTPs
-
Manipulates Digital Signatures 1 TTPs 64 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\FinalPolicy\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Message\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubLoadMessage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubCheckCert" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.20\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.4\FuncName = "WVTAsn1SpcIndirectDataContentEncode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\2.16.840.1.113730.4.1\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllRemoveSignedDataMsg\{C689AABA-8E78-11D0-8C47-00C04FC295EE}\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.5.5.7.3.2\DefaultId = "{573E31F8-AABA-11D0-8CCB-00C04FC295EE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\#2008\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.5.5.7.3.2\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllCreateIndirectData\{C689AAB8-8E78-11D0-8C47-00C04FC295EE}\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{00AAC56B-CD44-11D0-8CC2-00C04FC295EE}\$Function = "SoftpubCheckCert" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{573E31F8-AABA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubCleanup" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\#2004\FuncName = "WVTAsn1SpcPeImageDataDecode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{189A3842-3041-11D1-85E1-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubInitialize" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.5.5.7.3.2\CallbackFreeFunction = "SoftpubFreeDefUsageCallData" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllGetSignedDataMsg\{DE351A42-8E59-11D0-8C47-00C04FC295EE}\FuncName = "CryptSIPGetSignedDataMsg" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.5.5.7.3.1\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\#2003\FuncName = "WVTAsn1SpcIndirectDataContentEncode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllPutSignedDataMsg\{DE351A43-8E59-11D0-8C47-00C04FC295EE}\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllRemoveSignedDataMsg\{9BA61D3F-E73A-11D0-8CD2-00C04FC295EE}\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{7801EBD0-CF4B-11D0-851F-0060979387EA}\$Function = "CertTrustInit" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{64B9D180-8DA2-11CF-8736-00AA00A485EB}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.25\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.28\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Message\{64B9D180-8DA2-11CF-8736-00AA00A485EB}\$Function = "SoftpubLoadMessage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{64B9D180-8DA2-11CF-8736-00AA00A485EB}\$Function = "SoftpubCheckCert" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{FC451C16-AC75-11D1-B4B8-00C04FB66EA0}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubLoadSignature" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.4.1.311.10.3.3\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllRemoveSignedDataMsg\{DE351A43-8E59-11D0-8C47-00C04FC295EE}\FuncName = "CryptSIPRemoveSignedDataMsg" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{7801EBD0-CF4B-11D0-851F-0060979387EA}\$DLL = "Cryptdlg.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\#2011\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\DiagnosticPolicy\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubDumpStructure" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubCleanup" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\1.3.6.1.4.1.311.2.1.30\Dll = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.5.5.7.3.2\CallbackAllocFunction = "SoftpubLoadDefUsageCallData" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Message\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubLoadMessage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$Function = "SoftpubCleanup" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.4.1.311.10.3.3\DefaultId = "{573E31F8-AABA-11D0-8CCB-00C04FC295EE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{573E31F8-AABA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 0\CryptSIPDllPutSignedDataMsg\{DE351A43-8E59-11D0-8C47-00C04FC295EE}\FuncName = "CryptSIPPutSignedDataMsg" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{00AAC56B-CD44-11D0-8CC2-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\CertCheck\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$Function = "SoftpubCheckCert" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\DiagnosticPolicy\{573E31F8-DDBA-11D0-8CCB-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\FinalPolicy\{189A3842-3041-11D1-85E1-00C04FC295EE}\$Function = "SoftpubAuthenticode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{00AAC56B-CD44-11D0-8CC2-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Certificate\{FC451C16-AC75-11D1-B4B8-00C04FB66EA0}\$Function = "GenericChainCertificateTrust" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllEncodeObject\1.3.6.1.4.1.311.2.1.12\FuncName = "WVTAsn1SpcSpOpusInfoEncode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\OID\EncodingType 1\CryptDllDecodeObject\1.3.6.1.4.1.311.12.2.2\FuncName = "WVTAsn1CatMemberInfoDecode" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Initialization\{C6B2E8D0-E005-11CF-A134-00C04FD7BF43}\$Function = "SoftpubInitialize" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Cleanup\{64B9D180-8DA2-11CF-8736-00AA00A485EB}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\FinalPolicy\{189A3842-3041-11D1-85E1-00C04FC295EE}\$DLL = "WINTRUST.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\1.3.6.1.5.5.7.3.1\DefaultId = "{573E31F8-AABA-11D0-8CCB-00C04FC295EE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Usages\2.16.840.1.113730.4.1\DefaultId = "{573E31F8-AABA-11D0-8CCB-00C04FC295EE}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\FinalPolicy\{573E31F8-AABA-11D0-8CCB-00C04FC295EE}\$Function = "HTTPSFinalProv" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Cryptography\Providers\Trust\Signature\{189A3842-3041-11D1-85E1-00C04FC295EE}\$Function = "SoftpubLoadSignature" regsvr32.exe -
Possible privilege escalation attempt 8 IoCs
pid Process 1804 icacls.exe 1084 takeown.exe 2548 icacls.exe 4952 takeown.exe 3712 icacls.exe 2996 takeown.exe 4552 icacls.exe 4584 takeown.exe -
Modifies file permissions 1 TTPs 8 IoCs
pid Process 2548 icacls.exe 4952 takeown.exe 3712 icacls.exe 2996 takeown.exe 4552 icacls.exe 4584 takeown.exe 1804 icacls.exe 1084 takeown.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 53 4688 LDPlayer9_ens_1252_ld.exe 80 4688 LDPlayer9_ens_1252_ld.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: LDPlayer9_ens_1252_ld.exe File opened (read-only) \??\F: LDPlayer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 129 discord.com 130 discord.com 133 discord.com 136 discord.com -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\ldplayer9box\Ld9BoxSup.cat dnrepairer.exe File created C:\Program Files\ldplayer9box\msvcp100.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-string-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-crt-process-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-sysinfo-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\EGL.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\libOpenglRender.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\ldutils2.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\driver-PreW10\Ld9BoxDDR0.r0 dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-rtlsupport-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-crt-math-l1-1-0.dll dnrepairer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_1764247074\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_1396294342\autofill_bypass_cache_forms.json msedge.exe File created C:\Program Files\ldplayer9box\SDL.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\GLES_V2_utils2.dll dnrepairer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_734863070\manifest.fingerprint msedge.exe File created C:\Program Files\ldplayer9box\driver-PreW10\Ld9BoxNetLwf.cat dnrepairer.exe File created C:\Program Files\ldplayer9box\msvcr100.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\msvcr120.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxSupLib.dll dnrepairer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_98860510\manifest.fingerprint msedge.exe File created C:\Program Files\ldplayer9box\driver-PreW10\Ld9VMMR0.r0 dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxExtPackHelperApp.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxVMMPreload.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-crt-filesystem-l1-1-0.dll dnrepairer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_1453122509\travel-facilitated-booking-kayak.js msedge.exe File created C:\Program Files\ldplayer9box\SUPLoggerCtl.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\GLES12Translator.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\bldRTIsoMaker.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-file-l1-2-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-namedpipe-l1-1-0.dll dnrepairer.exe File opened for modification C:\Program Files\ldplayer9box\msvcp140.dll dnrepairer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_734863070\deny_etld1_domains.list msedge.exe File created C:\Program Files\ldplayer9box\Ld9BoxNetLwf-PreW10.cat dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxManage.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxStub.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-memory-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\GLES_V2_utils.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\Ld9BoxNetLwf.cat dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxSDL.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-datetime-l1-1-0.dll dnrepairer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_2039687907\manifest.fingerprint msedge.exe File created C:\Program Files\ldplayer9box\VBoxCAPI.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxGuestPropSvc.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxPlaygroundDevice.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxNetNAT.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\x86\api-ms-win-core-libraryloader-l1-1-0.dll dnrepairer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_1667827477\protocols.json msedge.exe File created C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\Qt5PrintSupport.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\tstPDMAsyncCompletionStress.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\UICommon.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-timezone-l1-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxNetDHCP.exe dnrepairer.exe File created C:\Program Files\ldplayer9box\api-ms-win-core-file-l2-1-0.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\concrt140.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\Ld9BoxSup.inf dnrepairer.exe File created C:\Program Files\ldplayer9box\VBoxDDU.dll dnrepairer.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_1667827477\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_2139801484\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3912_1453122509\travel-facilitated-booking-bing.js msedge.exe File created C:\Program Files\ldplayer9box\x86\libcurl.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\ucrtbase.dll dnrepairer.exe File created C:\Program Files\ldplayer9box\host_manager2.dll dnrepairer.exe -
Executes dropped EXE 14 IoCs
pid Process 4884 LDPlayer.exe 3456 dnrepairer.exe 924 Ld9BoxSVC.exe 1176 driverconfig.exe 2592 dnplayer.exe 2728 Ld9BoxSVC.exe 2732 vbox-img.exe 3760 vbox-img.exe 2804 vbox-img.exe 2840 Ld9BoxHeadless.exe 4412 Ld9BoxHeadless.exe 2412 Ld9BoxHeadless.exe 372 Ld9BoxHeadless.exe 1108 Ld9BoxHeadless.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4716 sc.exe 2356 sc.exe 4980 sc.exe 2376 sc.exe 3056 sc.exe 4908 sc.exe -
Loads dropped DLL 64 IoCs
pid Process 3456 dnrepairer.exe 3456 dnrepairer.exe 3456 dnrepairer.exe 3456 dnrepairer.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 924 Ld9BoxSVC.exe 2332 regsvr32.exe 2332 regsvr32.exe 2332 regsvr32.exe 2332 regsvr32.exe 2332 regsvr32.exe 2332 regsvr32.exe 2332 regsvr32.exe 2332 regsvr32.exe 460 regsvr32.exe 460 regsvr32.exe 460 regsvr32.exe 460 regsvr32.exe 460 regsvr32.exe 460 regsvr32.exe 460 regsvr32.exe 460 regsvr32.exe 460 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 2196 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1736 regsvr32.exe 1176 driverconfig.exe 1176 driverconfig.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe 2592 dnplayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LDPlayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnrepairer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LDPlayer9_ens_1252_ld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language driverconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dnplayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dnplayer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 3580 systeminfo.exe 4200 systeminfo.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION dnplayer.exe Set value (int) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\ldnews.exe = "11001" dnplayer.exe Set value (int) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\dnplayer.exe = "11001" dnplayer.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133869146984613059" msedge.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-7F29-4AAE-A627-5A282C83092C}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-1EC0-4C0F-857F-FBE2A737A256} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-FA1E-4CEE-91C7-6D8496BEA3C1} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-2F05-4D28-855F-488F96BAD2B2}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-80E1-4A8A-93A1-67C5F92A838A}\NumMethods Ld9BoxSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-486E-472F-481B-969746AF2480}\TypeLib\Version = "1.3" Ld9BoxSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-8384-11E9-921D-8B984E28A686}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualBox.VirtualBoxClient\CurVer\ = "VirtualBox.VirtualBoxClient.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-D612-47D3-89D4-DB3992533948}\ = "IHostPCIDevicePlugEvent" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-b7f1-4a5a-a4ef-a11dd9c2a458} Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-C8E9-466B-9660-45CB3E9979E4}\ProxyStubClsid32 Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-48DF-438D-85EB-98FFD70D18C9}\NumMethods Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-9070-4F9C-B0D5-53054496DBE0}\TypeLib Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-48DF-438D-85EB-98FFD70D18C9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-70A2-487E-895E-D3FC9679F7B3}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-8079-447A-A33E-47A69C7980DB}\NumMethods Ld9BoxSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-5FDC-4ABA-AFF5-6A39BBD7C38B}\ = "IHost" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-44E0-CA69-E9E0-D4907CECCBE5}\NumMethods\ = "35" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-7708-444B-9EEF-C116CE423D39}\NumMethods\ = "20" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-2F1A-4D6C-81FC-E3FA843F49AE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-1A29-4A19-92CF-02285773F3B5}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-E4B1-486A-8F2E-747AE346C3E9}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-C8E9-466B-9660-45CB3E9979E4}\TypeLib Ld9BoxSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-647D-45AC-8FE9-F49B3183BA37}\ = "IGuestSessionEvent" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-8CE7-469F-A4C2-6476F581FF72}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-08a2-41af-a05f-d7c661abaebe} Ld9BoxSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-1640-41F9-BD74-3EF5FD653250}\ = "IKeyboard" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-8084-11E9-B185-DBE296E54799} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-1C58-440C-BB7B-3A1397284C7B}\ = "IStorageControllerChangedEvent" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-0C65-11EA-AD23-0FF257C71A7F}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-1BCF-4218-9807-04E036CC70F1}\ProxyStubClsid32 Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-7997-4595-A731-3A509DB604E5}\NumMethods Ld9BoxSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-CF37-453B-9289-3B0F521CAF27}\TypeLib\Version = "1.3" Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-3618-4EBC-B038-833BA829B4B2}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-6989-4002-80CF-3607F377D40C}\NumMethods\ = "21" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-E9BB-49B3-BFC7-C5171E93EF38}\NumMethods\ = "17" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-CC7B-431B-98B2-951FDA8EAB89}\TypeLib Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-5a1d-43f1-6f27-6a0db298a9a8} Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-08A7-4C8F-910D-47AABD67253A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-4A06-81FC-A916-78B2DA1FA0E5}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-CF37-453B-9289-3B0F521CAF27}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-7006-40D4-B339-472EE3801844} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-00B1-4E9D-0000-11FA00F9D583} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-BE30-49C0-B315-E9749E1BDED1}\ = "INATNetwork" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-0721-4CDE-867C-1A82ABAF914C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-5637-472A-9736-72019EABD7DE}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ldbk\ = "ldmnq.ldbk" LDPlayer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-486F-40DB-9150-DEEE3FD24189}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-4A9E-43F4-B7A7-54BD285E22F4}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-1F8B-4692-ABB4-462429FAE5E9}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-799A-4489-86CD-FE8E45B2FF8E}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualBox.Session.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualBox.VirtualBoxClient\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-C6FA-430E-6020-6A505D086387}\TypeLib\ = "{20191216-1750-46f0-936e-bd127d5bc264}" Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-4974-A19C-4DC6-CC98C2269626}\ProxyStubClsid32 Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-929C-40E8-BF16-FEA557CD8E7E}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-A227-4F23-8278-2F675EEA1BB2}\ProxyStubClsid32 Ld9BoxSVC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-4A06-81FC-A916-78B2DA1FA0E5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-0979-486C-BAA1-3ABB144DC82D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-FF5A-4795-B57A-ECD5FFFA18A4}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{20191216-3FF2-4F2E-8F09-07382EE25088}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-8F30-401B-A8CD-FE31DBE839C0}\TypeLib\ = "{20191216-1750-46f0-936e-bd127d5bc264}" Ld9BoxSVC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-6588-40A3-9B0A-68C05BA52C4B}\ProxyStubClsid32\ = "{20191216-1807-4249-5BA5-EA42D66AF0BF}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20191216-AC97-4C16-B3E2-81BD8A57CC27}\ProxyStubClsid32 regsvr32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4688 LDPlayer9_ens_1252_ld.exe 4688 LDPlayer9_ens_1252_ld.exe 4688 LDPlayer9_ens_1252_ld.exe 4688 LDPlayer9_ens_1252_ld.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 3456 dnrepairer.exe 3456 dnrepairer.exe 2524 powershell.exe 2524 powershell.exe 5076 powershell.exe 5076 powershell.exe 4708 powershell.exe 4708 powershell.exe 4884 LDPlayer.exe 4884 LDPlayer.exe 4688 LDPlayer9_ens_1252_ld.exe 4688 LDPlayer9_ens_1252_ld.exe 5500 msedge.exe 5500 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 dnplayer.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeDebugPrivilege 4884 LDPlayer.exe Token: SeTakeOwnershipPrivilege 4884 LDPlayer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2592 dnplayer.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2592 dnplayer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4884 4688 LDPlayer9_ens_1252_ld.exe 92 PID 4688 wrote to memory of 4884 4688 LDPlayer9_ens_1252_ld.exe 92 PID 4688 wrote to memory of 4884 4688 LDPlayer9_ens_1252_ld.exe 92 PID 4884 wrote to memory of 3456 4884 LDPlayer.exe 93 PID 4884 wrote to memory of 3456 4884 LDPlayer.exe 93 PID 4884 wrote to memory of 3456 4884 LDPlayer.exe 93 PID 3456 wrote to memory of 3728 3456 dnrepairer.exe 94 PID 3456 wrote to memory of 3728 3456 dnrepairer.exe 94 PID 3456 wrote to memory of 3728 3456 dnrepairer.exe 94 PID 3728 wrote to memory of 4824 3728 net.exe 96 PID 3728 wrote to memory of 4824 3728 net.exe 96 PID 3728 wrote to memory of 4824 3728 net.exe 96 PID 3456 wrote to memory of 2096 3456 dnrepairer.exe 97 PID 3456 wrote to memory of 2096 3456 dnrepairer.exe 97 PID 3456 wrote to memory of 2096 3456 dnrepairer.exe 97 PID 3456 wrote to memory of 3252 3456 dnrepairer.exe 98 PID 3456 wrote to memory of 3252 3456 dnrepairer.exe 98 PID 3456 wrote to memory of 3252 3456 dnrepairer.exe 98 PID 3456 wrote to memory of 4208 3456 dnrepairer.exe 99 PID 3456 wrote to memory of 4208 3456 dnrepairer.exe 99 PID 3456 wrote to memory of 4208 3456 dnrepairer.exe 99 PID 3456 wrote to memory of 2588 3456 dnrepairer.exe 100 PID 3456 wrote to memory of 2588 3456 dnrepairer.exe 100 PID 3456 wrote to memory of 2588 3456 dnrepairer.exe 100 PID 3456 wrote to memory of 780 3456 dnrepairer.exe 101 PID 3456 wrote to memory of 780 3456 dnrepairer.exe 101 PID 3456 wrote to memory of 780 3456 dnrepairer.exe 101 PID 3456 wrote to memory of 2808 3456 dnrepairer.exe 102 PID 3456 wrote to memory of 2808 3456 dnrepairer.exe 102 PID 3456 wrote to memory of 2808 3456 dnrepairer.exe 102 PID 3456 wrote to memory of 3720 3456 dnrepairer.exe 103 PID 3456 wrote to memory of 3720 3456 dnrepairer.exe 103 PID 3456 wrote to memory of 3720 3456 dnrepairer.exe 103 PID 3456 wrote to memory of 2996 3456 dnrepairer.exe 104 PID 3456 wrote to memory of 2996 3456 dnrepairer.exe 104 PID 3456 wrote to memory of 2996 3456 dnrepairer.exe 104 PID 3456 wrote to memory of 4552 3456 dnrepairer.exe 106 PID 3456 wrote to memory of 4552 3456 dnrepairer.exe 106 PID 3456 wrote to memory of 4552 3456 dnrepairer.exe 106 PID 3456 wrote to memory of 4584 3456 dnrepairer.exe 108 PID 3456 wrote to memory of 4584 3456 dnrepairer.exe 108 PID 3456 wrote to memory of 4584 3456 dnrepairer.exe 108 PID 3456 wrote to memory of 1804 3456 dnrepairer.exe 110 PID 3456 wrote to memory of 1804 3456 dnrepairer.exe 110 PID 3456 wrote to memory of 1804 3456 dnrepairer.exe 110 PID 3456 wrote to memory of 1084 3456 dnrepairer.exe 112 PID 3456 wrote to memory of 1084 3456 dnrepairer.exe 112 PID 3456 wrote to memory of 1084 3456 dnrepairer.exe 112 PID 3456 wrote to memory of 2548 3456 dnrepairer.exe 114 PID 3456 wrote to memory of 2548 3456 dnrepairer.exe 114 PID 3456 wrote to memory of 2548 3456 dnrepairer.exe 114 PID 3456 wrote to memory of 924 3456 dnrepairer.exe 116 PID 3456 wrote to memory of 924 3456 dnrepairer.exe 116 PID 3456 wrote to memory of 2332 3456 dnrepairer.exe 117 PID 3456 wrote to memory of 2332 3456 dnrepairer.exe 117 PID 3456 wrote to memory of 460 3456 dnrepairer.exe 118 PID 3456 wrote to memory of 460 3456 dnrepairer.exe 118 PID 3456 wrote to memory of 460 3456 dnrepairer.exe 118 PID 3456 wrote to memory of 2196 3456 dnrepairer.exe 119 PID 3456 wrote to memory of 2196 3456 dnrepairer.exe 119 PID 3456 wrote to memory of 1736 3456 dnrepairer.exe 120 PID 3456 wrote to memory of 1736 3456 dnrepairer.exe 120 PID 3456 wrote to memory of 1736 3456 dnrepairer.exe 120 PID 3456 wrote to memory of 4716 3456 dnrepairer.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_1252_ld.exe"C:\Users\Admin\AppData\Local\Temp\LDPlayer9_ens_1252_ld.exe"1⤵
- Downloads MZ/PE file
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\LDPlayer\LDPlayer9\LDPlayer.exe"C:\LDPlayer\LDPlayer9\\LDPlayer.exe" -silence -downloader -openid=1252 -language=en -path="C:\LDPlayer\LDPlayer9\"2⤵
- Enumerates connected drives
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\LDPlayer\LDPlayer9\dnrepairer.exe"C:\LDPlayer\LDPlayer9\dnrepairer.exe" listener=6559443⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\net.exe"net" start cryptsvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start cryptsvc5⤵
- System Location Discovery: System Language Discovery
PID:4824
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" Softpub.dll /s4⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" Wintrust.dll /s4⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" Initpki.dll /s4⤵
- System Location Discovery: System Language Discovery
PID:4208
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32" Initpki.dll /s4⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" dssenh.dll /s4⤵
- System Location Discovery: System Language Discovery
PID:780
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" rsaenh.dll /s4⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" cryptdlg.dll /s4⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
PID:3720
-
-
C:\Windows\SysWOW64\takeown.exe"takeown" /f "C:\LDPlayer\LDPlayer9\vms" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\LDPlayer\LDPlayer9\vms" /grant everyone:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4552
-
-
C:\Windows\SysWOW64\takeown.exe"takeown" /f "C:\LDPlayer\LDPlayer9\\system.vmdk"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\LDPlayer\LDPlayer9\\system.vmdk" /grant everyone:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\takeown.exe"takeown" /f "C:\Users\Admin\.Ld9VirtualBox" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\Users\Admin\.Ld9VirtualBox" /grant everyone:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Program Files\ldplayer9box\Ld9BoxSVC.exe"C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" /RegServer4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924
-
-
C:\Windows\SYSTEM32\regsvr32.exe"regsvr32" "C:\Program Files\ldplayer9box\VBoxC.dll" /s4⤵
- Loads dropped DLL
PID:2332
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxClient-x86.dll" /s4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:460
-
-
C:\Windows\SYSTEM32\regsvr32.exe"regsvr32" "C:\Program Files\ldplayer9box\VBoxProxyStub.dll" /s4⤵
- Loads dropped DLL
- Modifies registry class
PID:2196
-
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32" "C:\Program Files\ldplayer9box\x86\VBoxProxyStub-x86.dll" /s4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1736
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc" create Ld9BoxSup binPath= "C:\Program Files\ldplayer9box\Ld9BoxSup.sys" type= kernel start= auto4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc" start Ld9BoxSup4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\sc.exesc query HvHost4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Windows\SysWOW64\sc.exesc query vmms4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo4⤵
- System Location Discovery: System Language Discovery
PID:5100 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo5⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:4200
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxSup" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe' -RemoteAddress LocalSubnet -Action Allow4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" New-NetFirewallRule -DisplayName "Ld9BoxNat" -Direction Inbound -Program 'C:\Program Files\ldplayer9box\VBoxNetNAT.exe' -RemoteAddress LocalSubnet -Action Allow4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" New-NetFirewallRule -DisplayName "dnplayer" -Direction Inbound -Program 'C:\LDPlayer\LDPlayer9\dnplayer.exe' -RemoteAddress LocalSubnet -Action Allow4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
-
C:\LDPlayer\LDPlayer9\driverconfig.exe"C:\LDPlayer\LDPlayer9\driverconfig.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1176
-
-
C:\Windows\SysWOW64\takeown.exe"takeown" /f C:\LDPlayer\ldmutiplayer\ /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" C:\LDPlayer\ldmutiplayer\ /grant everyone:F /t3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3712
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/4bUcwDd53d2⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2cc,0x2d0,0x2d4,0x2c8,0x2f0,0x7fff6471f208,0x7fff6471f214,0x7fff6471f2203⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1972,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=1952 /prefetch:23⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2240,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=2252 /prefetch:33⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2608,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=2612 /prefetch:83⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3516,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:13⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3532,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:13⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4400,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=4424 /prefetch:13⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4440,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=4568 /prefetch:23⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4556,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3688 /prefetch:83⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5292,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5344 /prefetch:13⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5452,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=2796 /prefetch:83⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5096,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:83⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5496,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3792 /prefetch:83⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5332,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5752 /prefetch:83⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5760,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5792 /prefetch:83⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5756,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5772 /prefetch:83⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5332,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5752 /prefetch:83⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5092,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=6684 /prefetch:83⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6220,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=6612 /prefetch:83⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6900,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=6656 /prefetch:83⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6316,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=6236 /prefetch:83⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6892,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=6868 /prefetch:83⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6776,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=6740 /prefetch:83⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7148,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=7140 /prefetch:83⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7384,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=6788 /prefetch:83⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=4572 /prefetch:83⤵PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5200,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=4452 /prefetch:83⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5124,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:83⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3664,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:83⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6364,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=2480 /prefetch:83⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=868,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=2484 /prefetch:83⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3668,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3704 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4756,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5544 /prefetch:83⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6388,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=6504 /prefetch:83⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2576,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3800 /prefetch:83⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6252,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=2512 /prefetch:83⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5728,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3800 /prefetch:83⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2344,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:83⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5172,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=1280 /prefetch:83⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3116,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=3128 /prefetch:83⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=876,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=1280 /prefetch:83⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3620,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5708 /prefetch:83⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1308,i,1946963320170237245,11305015275477974738,262144 --variations-seed-version --mojo-platform-channel-handle=5708 /prefetch:83⤵PID:2568
-
-
-
C:\LDPlayer\LDPlayer9\dnplayer.exe"C:\LDPlayer\LDPlayer9\dnplayer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2592 -
C:\Windows\SysWOW64\sc.exesc query HvHost3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\sc.exesc query vmms3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo3⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:3580
-
-
-
C:\Program Files\ldplayer9box\vbox-img.exe"C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\..\system.vmdk" --uuid 20160302-bbbb-bbbb-0eee-bbbb000000003⤵
- Executes dropped EXE
PID:2732
-
-
C:\Program Files\ldplayer9box\vbox-img.exe"C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\data.vmdk" --uuid 20160302-cccc-cccc-0eee-0000000000003⤵
- Executes dropped EXE
PID:3760
-
-
C:\Program Files\ldplayer9box\vbox-img.exe"C:\Program Files\ldplayer9box\vbox-img.exe" setuuid --filename "C:\LDPlayer\LDPlayer9\vms\leidian0\sdcard.vmdk" --uuid 20160302-dddd-dddd-0eee-0000000000003⤵
- Executes dropped EXE
PID:2804
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3ec 0x2fc1⤵PID:2172
-
C:\Program Files\ldplayer9box\Ld9BoxSVC.exe"C:\Program Files\ldplayer9box\Ld9BoxSVC.exe" -Embedding1⤵
- Executes dropped EXE
- Modifies registry class
PID:2728 -
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵
- Executes dropped EXE
PID:2840
-
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵
- Executes dropped EXE
PID:4412
-
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵
- Executes dropped EXE
PID:2412
-
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵
- Executes dropped EXE
PID:372
-
-
C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe"C:\Program Files\ldplayer9box\Ld9BoxHeadless.exe" --comment leidian0 --startvm 20160302-aaaa-aaaa-0eee-000000000000 --vrde config2⤵
- Executes dropped EXE
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4664
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD550260b0f19aaa7e37c4082fecef8ff41
SHA1ce672489b29baa7119881497ed5044b21ad8fe30
SHA256891603d569fc6f1afed7c7d935b0a3c7363c35a0eb4a76c9e57ef083955bc2c9
SHA5126f99d39bfe9d4126417ff65571c78c279d75fc9547ee767a594620c0c6f45f4bb42fd0c5173d9bc91a68a0636205a637d5d1c7847bd5f8ce57e120d210b0c57d
-
Filesize
947KB
MD550097ec217ce0ebb9b4caa09cd2cd73a
SHA18cd3018c4170072464fbcd7cba563df1fc2b884c
SHA2562a2ff2c61977079205c503e0bcfb96bf7aa4d5c9a0d1b1b62d3a49a9aa988112
SHA512ac2d02e9bfc2be4c3cb1c2fff41a2dafcb7ce1123998bbf3eb5b4dc6410c308f506451de9564f7f28eb684d8119fb6afe459ab87237df7956f4256892bbab058
-
Filesize
51KB
MD51ea48ba4040743ffc511b0cc923a178b
SHA172b76002087d62c9580ff2a1655b41095826acc4
SHA2561e2e3ca8d4bfe01a68586e3568b8964eba8bf92a6bc19b7c245865ad9ba7280e
SHA51220bc651739a267514cf2b7d158c2d0a56ac0251fe8c5f79eed7d88f6628d92d3bd3b697a6c958fb1f46f853c6defa204a6557996ad9d32a741e787cb8188026d
-
Filesize
1.3MB
MD5c4e98fdba5d3b3a95f96abf279bf240a
SHA1c6bce2c2ae044fd4054a58f2fd9757252b4e9afe
SHA2561f817c6cf7ba37f0d89e45640639e1b8256639045de98bfa63f17de3f4eacb16
SHA512799cfbda36d41e2029b1d13a600807731cb230b2ceb96f2b77a260f4ea174af810ba1e64dd04d43a38f9caa6775ae0523c61f614e5b8c857433cb02ae06ef5ac
-
Filesize
3.7MB
MD5b668762c83ea3cb69a400824e3c56c23
SHA1087621217249a70dfd7cbf2c46ee7a3053636d9d
SHA256c167875d270e8a307dc7c125a118d2fce8b61425dded1bff0486115e6677afb9
SHA512819928240e9f005cee2101f84d7c27bd1036f625d77ddd12f672b54d993fd4bdce32189f369f18ac36786b07d8d6602f281aa5888db7a86f92ee5ba2d179ec29
-
Filesize
41.9MB
MD510b376bf925c50a88096b601abef4d80
SHA124a3d1ecb2e0087b2140c6674453fcf9d82cf150
SHA25613a241b6d1144cbe2e11c9d46ebd26a649f574db8c4bf1a98a92fbe824038912
SHA512fb7dc9db718dd94c7d275388aa376ca219b8c865d6a05b6392d5acc964c67980458ef2ad7746ac8589e01cb95e4830c7ca0301c15300de1c6c02d2a8bf52bde1
-
Filesize
5.6MB
MD5ba84bf6204db711f866adb2841d5c91c
SHA1807a03b5ddb07b9e8e30c8261e3ba5514cc537e2
SHA256dad6ee5a8b12b9396b56d827fe91fc8d3f9468428e32902390c0ddef596f2f26
SHA512ad18d5a353add4e7ffc8868c9ce62ebea947531684e4a054dce116a97a8397dfce39dfc7744cf416fc1259035824645a8ae71b4eed9f8fd5d534c29995c0578a
-
Filesize
314KB
MD5e2e37d20b47d7ee294b91572f69e323a
SHA1afb760386f293285f679f9f93086037fc5e09dcc
SHA256153161ab882db768c70a753af5e8129852b9c9cae5511a23653beb6414d834a2
SHA512001500f527e2d3c3b404cd66188149c620d45ee6510a1f9902aacc25b51f8213e6654f0c1ecc927d6ff672ffbe7dc044a84ec470a9eb86d2cba2840df7390901
-
Filesize
652KB
MD5ad9d7cbdb4b19fb65960d69126e3ff68
SHA1dcdc0e609a4e9d5ff9d96918c30cb79c6602cb3d
SHA256a6c324f2925b3b3dbd2ad989e8d09c33ecc150496321ae5a1722ab097708f326
SHA512f0196bee7ad8005a36eea86e31429d2c78e96d57b53ff4a64b3e529a54670fa042322a3c3a21557c96b0b3134bf81f238a9e35124b2d0ce80c61ed548a9791e7
-
Filesize
1.5MB
MD566df6f7b7a98ff750aade522c22d239a
SHA1f69464fe18ed03de597bb46482ae899f43c94617
SHA25691e3035a01437b54adda33d424060c57320504e7e6a0c85db2654815ba29c71f
SHA51248d4513e09edd7f270614258b2750d5e98f0dbce671ba41a524994e96ed3df657fce67545153ca32d2bf7efcb35371cae12c4264df9053e4eb5e6b28014ed20e
-
Filesize
2.0MB
MD501c4246df55a5fff93d086bb56110d2b
SHA1e2939375c4dd7b478913328b88eaa3c91913cfdc
SHA256c9501469ad2a2745509ab2d0db8b846f2bfb4ec019b98589d311a4bd7ac89889
SHA51239524d5b8fc7c9d0602bc6733776237522dcca5f51cc6ceebd5a5d2c4cbda904042cee2f611a9c9477cc7e08e8eadd8915bf41c7c78e097b5e50786143e98196
-
Filesize
442KB
MD52d40f6c6a4f88c8c2685ee25b53ec00d
SHA1faf96bac1e7665aa07029d8f94e1ac84014a863b
SHA2561d7037da4222de3d7ca0af6a54b2942d58589c264333ef814cb131d703b5c334
SHA5124e6d0dc0dc3fb7e57c6d7843074ee7c89c777e9005893e089939eb765d9b6fb12f0e774dc1814f6a34e75d1775e19e62782465731fd5605182e7984d798ba779
-
Filesize
1.2MB
MD5ba46e6e1c5861617b4d97de00149b905
SHA14affc8aab49c7dc3ceeca81391c4f737d7672b32
SHA2562eac0a690be435dd72b7a269ee761340099bf444edb4f447fa0030023cbf8e1e
SHA512bf892b86477d63287f42385c0a944eee6354c7ae557b039516bf8932c7140ca8811b7ae7ac111805773495cf6854586e8a0e75e14dbb24eba56e4683029767b6
-
Filesize
192KB
MD552c43baddd43be63fbfb398722f3b01d
SHA1be1b1064fdda4dde4b72ef523b8e02c050ccd820
SHA2568c91023203f3d360c0629ffd20c950061566fb6c780c83eaa52fb26abb6be86f
SHA51204cc3d8e31bd7444068468dd32ffcc9092881ca4aaea7c92292e5f1b541f877bdec964774562cb7a531c3386220d88b005660a2b5a82957e28350a381bea1b28
-
Filesize
511KB
MD5e8fd6da54f056363b284608c3f6a832e
SHA132e88b82fd398568517ab03b33e9765b59c4946d
SHA256b681fd3c3b3f2d59f6a14be31e761d5929e104be06aa77c883ada9675ca6e9fd
SHA5124f997deebf308de29a044e4ff2e8540235a41ea319268aa202e41a2be738b8d50f990ecc68f4a737a374f6d5f39ce8855edf0e2bb30ce274f75388e3ddd8c10b
-
Filesize
522KB
MD53e29914113ec4b968ba5eb1f6d194a0a
SHA1557b67e372e85eb39989cb53cffd3ef1adabb9fe
SHA256c8d5572ca8d7624871188f0acabc3ae60d4c5a4f6782d952b9038de3bc28b39a
SHA51275078c9eaa5a7ae39408e5db1ce7dbce5a3180d1c644bcb5e481b0810b07cb7d001d68d1b4f462cd5355e98951716f041ef570fcc866d289a68ea19b3f500c43
-
Filesize
854KB
MD54ba25d2cbe1587a841dcfb8c8c4a6ea6
SHA152693d4b5e0b55a929099b680348c3932f2c3c62
SHA256b30160e759115e24425b9bcdf606ef6ebce4657487525ede7f1ac40b90ff7e49
SHA51282e86ec67a5c6cddf2230872f66560f4b0c3e4c1bb672507bbb8446a8d6f62512cbd0475fe23b619db3a67bb870f4f742761cf1f87d50db7f14076f54006f6c6
-
Filesize
283KB
MD50054560df6c69d2067689433172088ef
SHA1a30042b77ebd7c704be0e986349030bcdb82857d
SHA25672553b45a5a7d2b4be026d59ceb3efb389c686636c6da926ffb0ca653494e750
SHA512418190401b83de32a8ce752f399b00c091afad5e3b21357a53c134cce3b4199e660572ee71e18b5c2f364d3b2509b5365d7b569d6d9da5c79ae78c572c1d0ba0
-
Filesize
5KB
MD5fdee6e3ccf8b61db774884ccb810c66f
SHA17a6b13a61cd3ad252387d110d9c25ced9897994d
SHA256657fec32d9ce7b96986513645a48ddd047a5968d897c589fbc0fc9adb8c670f4
SHA512f773f6fc22adadf048b9bfb03e4d6e119e8876412beb8517d999f4ed6a219e2ba50eded5308d361b6780792af9f699644e3a8b581a17d5a312f759d981f64512
-
Filesize
40.7MB
MD5978180cc9379ba1ec56b12c8957111d5
SHA1db445a9c5fa48b0d555cab2b6b8aa668466570fa
SHA256262a726ce1c0f87f4ce0351a3c74a2d54cf1a86f479b47d8649493b05037f8d7
SHA512e0f8d630ab1bde9a02806499c15743cf98f81d4872c39f2e54c986d52ffd140df0bc0a5f3c2692a05af55e2e039365b99c28aec753ce9165def15cfddf57741b
-
Filesize
1368.3MB
MD5933f4679e2238a4bc3c9eac8fe15700c
SHA124579dfd47877e5b3a66bb8a03380a8d2c3df9f5
SHA256578c3d84a97fdf838221d08d8b867427fe834d7951b89908bfb4ed3a48954f12
SHA512464888c640bbbc26720650063dfb00c75a165a026396c960ebcaf4eb51f549142d066d027cc0c6403d6a68acf485527b438a1f587fb64080e4c32ce62cb18ec1
-
Filesize
532KB
MD56e7fbe564419ee8d3da070a763781334
SHA1ba925047bd904b87b363ad72f9866e7657642410
SHA25672436a0b09332033d6f5e4688f49e6497ac98fec9bb79c34ce9c551bbb21807e
SHA5125416efc6d831560593e0ff43bcaec4d42f16a88899f737bd938ac180a68cd6e4cbe1282bf3454db16394e0e089f48c86b131c2efee2c876712434d904aa4f3e2
-
Filesize
18KB
MD5cde2424d99db56dd0d1eaf34811738c1
SHA1cc7889c43729b93a4e193b2fd6ae5f22b6ad6b8f
SHA2564ceaf28cadfd0929b44e9c686b93432a7151504c8ffe2a6afe516f9b16538131
SHA512d5b8ef2de3fefde29b2c9cccb330c3076ba71d6ae29e1b34617057d8a832d37eae8e2f238e2abb6eb226453c00a835c669a7c03a00cd1698d02272d8eb6998e2
-
Filesize
17KB
MD5acf4321ac8c8ff4d0442c799d621f8d9
SHA1b12f87e6afc48697f1ce8b587715361e89b79cae
SHA25669b84f7318798a91143e3d273ae9c0bedaabba930e3702447d493e2b8dd70725
SHA5127878a7cd62f9d259a6bab05e13e9ac5b16437c0d8bda46e864f205465ae19531e5655d7547ae1594a53a05ddeb8b0c6058a73caeb21cd7c81fe5a424303d3bde
-
Filesize
17KB
MD53c47c25b8141d20b2b4d576000000a61
SHA104543f9cdd847ff66389c9fd1e12b444dae6383a
SHA256290030199e8b47d6bcf466f9fc81fee7e6aebc2c16a3f26dd77019f795658956
SHA512c599ef06045583b28faac051909c28f5f2fa56c34d47f3bd49efc101a1cdcb571a298eb100d0b381e3ebb1ba19b2fb4dd5127f259eb8ab183753722ecbe0f10a
-
Filesize
18KB
MD5e05ce0232e64328c62c9da37698566bf
SHA150c25e6ecec2cd17ecf3117bb9a646ba107d2b84
SHA256573aed3f3eb436f9b7c24d51be3be2105deb8149ebda9b964660930c957b2410
SHA5128093bd5d1ad96d759a5d9183fca27d7cb756e0884776673f132d20119e602ea33f8121893b9b90965b0eb5710e244faf4e2ad738479998fc2c5dc37f83fe18cb
-
Filesize
21KB
MD5a26c7ffcf18b62904dab7786de638ea6
SHA1b28489bc38ee2f522ee83dcf49faeb96f39a77e3
SHA25674075b7af84378cee0d035c020b320ee52a120b21f71a4972093c9e23d534830
SHA512768c8d7818acacf83d8bd020ab239408673f6cf9e0e8f1be1dab2dd58c5df4e45b970baf7d8d09887280be0788790eacd6126274deaca6b1c4b7bad3e335b34f
-
Filesize
18KB
MD56a55a7e284b51b086b63cc6f2061ce8b
SHA146a48a1ccf5262038b71ed4be09cf625009d078d
SHA256d9973270a952b4ce615104520051e847b26e4b1cc330a5a95ba1ae128f0dfdeb
SHA5126a6ba643bf15581cd579e383bac351ccae714d50453cff52cac7dcf5bd472a170e7d33b0509c7bd50c5e76e8a0304fa88dcad63a9e2cd0694a5c56f4a21ae363
-
Filesize
18KB
MD56e38a6bed88e1c27155e4dc428188ef0
SHA18b47a1960ed157f7beeb80fa4a16a723279c4efa
SHA256144d3a28e43e47fc1cce956255cc80467d4a6fbbb8f612ec6d85f62de030a924
SHA5123b801875bc5a483eea6d6cc43015e759ee1f66c12585f698cb92368455f25b5309617c8beae39945cadb57009a9c9a9ce21c18dec28e86097c67d8fc5f9febab
-
Filesize
18KB
MD59304209688e2a18d0b26997bc78fda7a
SHA15d4332cf1c5123418c6419d0291486c3939e8785
SHA256d6bc1509fd2d4ea07e661f2f59395b4d71907d16f59942443a5d460df343dbf4
SHA5125952e192b6150055bc88e672fb0254bc962abd27afb5c30cd0f52ede98ad84eba9966d721b3b6602116ff40ad5c489a24eac35dde77397db88aa46ad2bd18960
-
Filesize
18KB
MD5f42a84d78a5a15ff1a4dbac591e95783
SHA11cd5b5e68fd729bdd340463b53728634d342b0cd
SHA256f60267cab87dfc1accf912c212186112aba38742f621549d6bc8d67e217e7234
SHA51289ba6571df642dbac769c72914b30f2d27107f023a9e1cbb0c6f5412b6a69d414cd99f29de07d06592c7ab9cdfc558f3b65b7050921bd442c01417bac0a850f0
-
Filesize
18KB
MD59f286e57e5b1c1a347adf9eef059ad5d
SHA1631aa1aa364234acc5ad20b27f926e9cb9ee4276
SHA256f93ddef4ac14ef778790f3f00057ab6cafc0c99dff52cc24f523d63917719970
SHA5126df20707ccda0cf9916b7c00b11a4a82b47a0f6e87c6eba0f38e440e143b4aa6e5b48f67d09a9eeef75da2aadfbb5abc7e62362f50d674bb8a532e290699a197
-
Filesize
18KB
MD5beaae8294db31afa04fa60795c6e02ae
SHA18a32ebd843e461864747fe0aebf4bbf83c4ec093
SHA256f8e8d85035bcb478ce2ab47a6476a8c756a7c8fa05bad66b9a03ece6a2ced141
SHA512dd1a75943401ae5d20c9ee023ba77000db9433a643ec2f102cd3a72faf274deb3611954557c81120d81ff447f86b7309cec1c9005ab37ed7bb48d6e6c239b135
-
Filesize
20KB
MD52ac1289e4dbab076b332869bef26d3ce
SHA160570ddd06b671e26c6a814b9c08cdfa0ef38aba
SHA2566475f20f46814d28845c2fa73e9c283a8504483fa16d911325588c778cf76c26
SHA512e226fb4739d66e2c4624a9e01ec00dbe3b37dc96995eec35660208d76a9e6758a2a29be1b7986d14074df23ea0fc39d2ce121b7bd32c553371c1b15ff3e2ef7a
-
Filesize
18KB
MD5a2661a468bb87ee9cc5dee968fd3805c
SHA19b17fbd552e34888f1453f9113ff4c42efaf6d6a
SHA256dc41da54e717aef60228ee11d10669c31d3ddd532eee9ecad944c09b71b762dd
SHA512b5c01cb3c991fcf8945c764b853f8a32fce324f01562107e086dd998a1b31f9285a0d645c96052b94c955f3626691c3ca2cc9e04d8594a0a7c042530549f1aa3
-
Filesize
18KB
MD5acbfc011d5842ba60c372ba3d222ab70
SHA116b8014060a04bb03215f6ce4c118bae48653bd5
SHA256b0ae48eb5ff51fa038e1ed23c7c48d266c20c2af3f9907ee6906bb0346df7f9e
SHA512dce34d64e6674b67c7c6e7c34886c1ede2967e6af7cfe2addfe51fcf70780a33d7308e7ce81a80149034b8f910c045b3ea81f458d9227448fc4b339dc05a59d3
-
Filesize
19KB
MD519d14d348ac38737431a7ee2f82973e6
SHA111cd8f5dc5c08d133b9b006da5c84946f012cbb6
SHA2561cd9cff9f7d24b22993a207cb81f15ce2792fa5f941e77e8280db00db6a273ae
SHA512b3bf7426150bf3b933db4670db3b7d22530c7087efeeab0ddacfbb0bffc01aabdac68e535c7298b13a42530a1aab2340203874b5382581f59309ec9465f6a0cc
-
Filesize
20KB
MD5ea0e13feac13dc18c79eb682bef4676e
SHA1b9db47624345c68cf07bd2677df537e0f975caf9
SHA2562658242ccd090181ed944f682c435e5fb880f3b21d1811d43b93478901d701b0
SHA512540b9f8b18d42e551f13de3d4a6f0f821ea23e4c85a6346b84e8b74d02cfb5413355d126913699208faefd67680c52cdf4e6ecd66fc0cb4753ee603fe9763df7
-
Filesize
18KB
MD51af2a91dc0a4e48bab0ca123073adf30
SHA1cf6625fd31b17d46dd31b16372840c74026d0ba2
SHA256ae574c9b8a2467c3ee0ac3e862255e93a02627bce146ad7b720b99905dc224fc
SHA51245103c51fc655f608e687c8e9db24c956d12c63b0497ced3817aee3d9f5fadf0741064ccb49ae71fbf377228af315c961fa414221731ea4892425ed4939bbf51
-
Filesize
17KB
MD59b9d1949b75df171884f6f8caba7ff59
SHA1411adf413f53c56488d5cf68e9b4b692889f3c4b
SHA256cffb2007c31932b092cda3a0a39f1cfcc5766b6a1c05e5eaeabc53660cbbe786
SHA512dd2110a2406e9cf70e26076ff4bc41f5478ece318ac48e8c7d8101e14c41284ddb2ea305560e1fa27d70925525553969fdcab243b31c0fb5ac460e1f00db2b7c
-
Filesize
18KB
MD5c6e268c877a9be5b43877308b1231120
SHA1949105c826dee6a32fe1288285e3e41cb7d04821
SHA256eae3cd8747da3b435846901a1dbe0e430666d3d8d7ba6e54307cff5d6ee0592f
SHA512776fe5cc3e5eb7ae9c20e15c6c5bce20fb2a0e9e81d260a08dc41860b3967c7abdc3142786421f349ebe9c43a12e261a34e3e176535b8e04545395279c439331
-
Filesize
18KB
MD55122b8aa14a25c8567d9d0335036446f
SHA181961f2c8a331136f8156930779964a71e0badc4
SHA2567b5393e2cb79f0396d5d97510e8f0955a2586aacaf60eb8de3676006cb81dc5c
SHA512758ff98f838f3ca03ef6a9e5a0e39732afed73f4d15dd7d7a1a842c36ad00a859541b4e977af513ddcf970ed994cc27b11654ddc0f15fffd83bdbeff43084cc9
-
Filesize
20KB
MD5e1b30d56617709cf7dff5f464d7566d9
SHA1e29646b1c90550cb86ed42782c764d41f2c70651
SHA2565d1a854a0c5121e2e8866dad26545f7f8c2d2f1b15ed7f1ed0b72654a1fc299b
SHA512e158389a4f71eb94a2e73706f0d52db91798104d990065029a3745dbc9a0459ed9ae96c78bd005043de9057bae66f35a174537c525385abc8e91dbbf579ba511
-
Filesize
18KB
MD5e4b64b2710725ec3332021bd8044d884
SHA12d7f8d87d0f395296ecdf277084d23cb9e0880e8
SHA2569566b81b1c6db1727a4bb3a7a3de12247ff5297f34548593280ec31f2b2e2c65
SHA512ae5570a2cd245588a3f80744c7b1af99533730ebf8926f51a2cc13004a6eb5ecb501aa8c2906e5fa5ddc5a92fb796d54af43b3e3ff97ca1cc3d898462bf7e9b2
-
Filesize
19KB
MD567fd470a60fe8fb3f9fbe32fa52871d0
SHA109aba019a0d0dae7415b6d9a39e1dc67d93f130b
SHA2561f98f9e044d32e61445c5fab3c80c2f37ca6bab3d5b22cd5611fb5df73db04a8
SHA512f8c3f1e3bee196487aec704f128240acb57fb392db918a97176793b07726f017177abbb5a6c68822fc59ce06f04d489a78284a865efdc2de518f34ecfb0cc1e6
-
Filesize
18KB
MD5f53ed8a0c18157b9e37500621dfab9ee
SHA1b8a3131150cfd46052353309843c802d9f43df03
SHA2565909e928d791f67a13e3130033cb0e2178f5167a644c3ab5336322d38356db47
SHA5122cc98322e67ff49aacaba0b23fb559a5c4c58182e4f3965673a766d3198a26fcd7c7c340779d9fb0fc3f2649c16427ff312d87caa1feadf23dabc6675169416a
-
Filesize
18KB
MD52b9f551cddd662c618432a75c546b296
SHA11ddd65fcc8bb401c734ebc2014d057328f771744
SHA256070afbdbe5b3f3b76b6b7ea2dbb9f8deff81c6ec8706eef9080671543e2ae28b
SHA51254df6e692ac630d969a697c9e6f379c4826ca71b7e8eaefdf502405b1333a6b483256aeba609a4a1c61e73f72d2958aaf3eb31538cc5e7a91101d7d09e3ed9dc
-
Filesize
19KB
MD57d943f85ff8d1515a02d202ae79453d3
SHA194def1f7368172ac50b665e74b89e8f7aae2857b
SHA2561d4464fe335470452e58d613028dde2f105edf969d411e90ba7ca9e343c3fc89
SHA512e111dbef97c6c6cb3b5c2d183294620792c48a2cb16d9d91c12cede757a1c0c53d707f4294542bef47eae784893bf63fe0f0229bed4b2d0a961c8d1cc1cf43cb
-
Filesize
22KB
MD5278857b86f667c47cbcce94f5ec73ca8
SHA1a0f5b7e7c67f3c6b8f285d39d08b740e49445755
SHA25691c5966932287078d0e616d8e0369347991f39765749bbffa1ed3a9df49776d9
SHA512ebc02d1a2e223eb0b30a8e62089735faed83add4161094493f62561a09c13a426815e7f06c20c44477691109a8c3040dc68527023bfee6d9984c42d6a05208c9
-
Filesize
18KB
MD56493b21fefae874655c62a56a156f3eb
SHA1c65beb46f9f03d35867ff008026d3a56fa26fb65
SHA2568d9d3e905d072c4465e4787dd5bd843d3a5dd5ac5ad9d7f232032b25facc82ab
SHA51293cbe187f7fa86ac58191b5384a993135e3291873a76cc2cf81dd60c68ad7591386e4eb5ab53aaac2a6f48f7f778263b7fa0a4ea0863361910a9f1efee92b64b
-
Filesize
20KB
MD5ae83311041ee793253ff10736317a09e
SHA1c62d06cb6cbd9d997c42a6ad7f13c06f38725069
SHA2568f9361d02f68392127fe264655eac4fef4a4a1bf63571f184ce26faa98670702
SHA5120fabcb0370330460f8f525401f339535c08d768f075816989a16eff2256584cfa8fd6832df3ce3d9c2a5364b4ef58bfff53cc486e3b48d11b654f7174aa18458
-
Filesize
18KB
MD512311308d7d65895b3920b3dd3e54b3b
SHA13faa74c6913f451d9c575761630b507af0c15ee3
SHA25676dad3e04c9ff61b40ae1c9e039837cd1c077d59b6a008643e4fbf2dbdb564dc
SHA51267fd047e760dbdadb06cc2c34b935fdabc629fa988484a9f5120cd59d6167d943b612df65626701022b5e73c5b1177a8d813e90c5990468f51a5a11932c008ed
-
Filesize
18KB
MD53dafcf25a2ac1becf40acbec8fc7134b
SHA10729fdc617403622c2edd77fdb7dd49b530e2037
SHA256ba1458f730ff90009483c763926d1c74383480e529541c0ef5d4de44e7a4f14c
SHA5129dbb487489c8a6af8dbd6326fe4958f489552af268f2937495ada35bb8404cfaeaf54833d8bba2966e72cd0ba3284a5fd167baf4cd6d905870f5d1ed3e5ff6c0
-
Filesize
27KB
MD5f32bd567d35d2e85504c39dede609e72
SHA1b7a7145956466e45bbe6f7fe41e935a152c2c325
SHA2565f2bb085217304006c81c55214c6093ec476e554e31808026e424da82f58aa0e
SHA51255396f3e5821d3f3eb5988bd3362a0cddf036de4afa8cc1214813834b5a152fc3df787a8347a7aff3de6bf112e1d2a354790f593854a59f1f49393ddf967d085
-
Filesize
25KB
MD556c02fabc2c64174009c905570c3a22d
SHA1e52154112ad127ab01937453490091def4d21ad2
SHA2560aa2cf2cc029c95fc053374071d7873edddc410ff8858720ee5c29bfee62dddc
SHA5129f22f70b5de4078fcbfdbb186d6cf220561200092eb7ceaaad9d44a5281f84abfb1729f4e447dab3753225d5fc6c44d94363e3729e5765dd2213213c327c4c1b
-
Filesize
69KB
MD54b27cf5cdb20aebf113df752019ffca3
SHA1b02c6e45f704dac118f81c324122c189e3e61e17
SHA256c1e206aa4c8014dcfdad15c16f50fbf4e3ce8e76e9406af923131ebc001dd5ac
SHA512cd4df2478d719e159e2252e6784d24e4260c13d8f47774ac33a8e10b1fa96d38236bf2c3ebc060a5801fc19392cbe5c636befa898721bf114956c2be6476bbd1
-
Filesize
19KB
MD5fa677cfb18ba1370d8bb98681c48cfbd
SHA1cbccd561bf53c59254fb04ab136996b81cc80d3a
SHA25636589e9738a9358065d5a72f4276505d6c2f78101508bede05bdcceea46a8cd8
SHA5129312acd4955d4950d851910198d4ee622b75e11262e409c79391078d12d2d0db320723a1552048acc0e9deb30378e3cd27d4fabcf2077d429eedfb275cdb73e3
-
Filesize
22KB
MD5595a997bd415c8ae0ef1e3c3b73e6091
SHA110f34bc2f474a43bfaac26f66ec8081106c12253
SHA25611aca97acda31203aeee496c9f183b49db1c54d0efa48888a15ab4ea47ee080f
SHA512944f6bc405c69d6bf6dc97652e9f296658bd3de078dda50ac680e56818c00dfee909b100fc2fa9c6a891c55dbc66dd62ac52819950732c83198dbb8c04f3c9b8
-
Filesize
24KB
MD5415d765aa267382a79e56e428c80b1e1
SHA11bf13460b8aaac1538bf45186a1624825bb8c355
SHA256cf7bbe93ae75a1c46a38204a6acef71bf2f5e3cd34501825601900e07d3d7b15
SHA5127236ef7b2937718409ef4eeda20318b1697e7c1c868d0df263f4be8673365d48ff6ffa2317bfd1881b6cb3dd1300410ad4f715b8e01ed321c4011aac88490d21
-
Filesize
24KB
MD55bd5a9001cb0555c5b2b14e0cbc8d922
SHA14562d23fba312fe95cbc777fd7c2e37ca1e76ad9
SHA256b516d1772b75714f039440cf5d070b87a187d2f67b7f891c94cf1c60330fbfa7
SHA512a6271f28f069a00c2912f80552bd54bf0d8461886adff626b336d25943dd0ade19eb88c718602017a1986317af3eb5f94f8896e88b9367207e8b53225322cb84
-
Filesize
20KB
MD5f719ad4c04043f55a21e73805997b287
SHA10e88b1271b242f7933e78edcb05131612cea061e
SHA256a4b0f75854949980d410c5da90c36ddb94be292431c89fd3e992f9d5f8ee9983
SHA512752b9b4385162126729c3f09b3b75d7121c8dec00cce11f7cf1ecaffed3e79addcbcfe8bdd4e20e15b8494bfe2d24c3f2d11583860b1e03be021196bc83fc3bf
-
Filesize
18KB
MD5a405399d5b958a03e6054307a631553a
SHA1dba43f0afd8c6e1f61cf0be7503c6f70b48b8240
SHA256d675ee0c418c4cd7ff0c19c2d945331c8e6072a51abbca548e7d9d2f1bf288dd
SHA51233c64766053058fa9fa4fe689f1ca5a345b8b70443995d71aa65b64c7bb38d4dc3a2b37ad06a4ce5ca1c927ed9ea4377443eaaecc69b0e758ff265e755194287
-
Filesize
310KB
MD567a3ad0fec3eb767e423e3d7a9134343
SHA142949506bc8451031425840df33f3acab5637b52
SHA25601729ff33c2e3db1033fb86e899d62026dc1c03705269bb9636227f61934d9b3
SHA512f3b13d38f44acf37c5002f08b684cb2955b778c8a703c8fca6e07eecaac45e1bf4bb036dda055114152390322351ef936492abbf6532d1a48fcfd29304b4db1b
-
Filesize
51KB
MD58a2ef730063317fcecc510063c11c28e
SHA16992058fa89a2c6ed41ec02afeab0dc9c7d96a51
SHA256f404f48b5d8223571b4697ababf7da60404ed5fec958bff698d7cffaa6a4fff9
SHA512c88035598f187125139b93756e5f4324ed253494d63262c9a153a0f4a450a1aff9ccf594e7c82fe6245bac3c055b3c60d84eaa0f5a70d11ef974ad8752686771
-
Filesize
636B
MD547187c36cd58cfddebd89f67b8c4ded5
SHA17b5407c21d34941ae19f4fe83b4a42da2ff15877
SHA256320d8d8557dce23a6e5101ce228e64e0ae24f702dc232ebec9e2ec381ba95fae
SHA51249876135beb8a90ea86438ae07f0d6d5a7c9345b96806dd8354aeddc6232cd2f0ce1b475a4035f44032ccb6795418485a14b54aa5e798fb9a27326043e6cb188
-
Filesize
35.1MB
MD54d592fd525e977bf3d832cdb1482faa0
SHA1131c31bcff32d11b6eda41c9f1e2e26cc5fbc0ef
SHA256f90ace0994c8cae3a6a95e8c68ca460e68f1662a78a77a2b38eba13cc8e487b6
SHA512afa31b31e1d137a559190528998085c52602d79a618d930e8c425001fdfbd2437f732beda3d53f2d0e1fc770187184c3fb407828ac39f00967bf4ae015c6ba77
-
Filesize
103KB
MD54acd5f0e312730f1d8b8805f3699c184
SHA167c957e102bf2b2a86c5708257bc32f91c006739
SHA25672336333d602f1c3506e642e0d0393926c0ec91225bf2e4d216fcebd82bb6cb5
SHA5129982c1c53cee1b44fd0c3df6806b8cbf6b441d3ed97aeb466dba568adce1144373ce7833d8f44ac3fa58d01d8cdb7e8621b4bb125c4d02092c355444651a4837
-
Filesize
119B
MD5f3eb631411fea6b5f0f0d369e1236cb3
SHA18366d7cddf1c1ab8ba541e884475697e7028b4e0
SHA256ebbc79d0fccf58eeaeee58e3acbd3b327c06b5b62fc83ef0128804b00a7025d0
SHA5124830e03d643b0474726ef93ad379814f4b54471e882c1aec5be17a0147f04cfbe031f8d74960a80be6b6491d3427eca3f06bc88cc06740c2ad4eb08e4d3e4338
-
Filesize
135B
MD54055ba4ebd5546fb6306d6a3151a236a
SHA1609a989f14f8ee9ed9bffbd6ddba3214fd0d0109
SHA256cb929ae2d466e597ecc4f588ba22faf68f7cfc204b3986819c85ac608d6f82b5
SHA51258d39f7ae0dafd067c6dba34c686506c1718112ad5af8a255eb9a7d6ec0edca318b557565f5914c5140eb9d1b6e2ffbb08c9d596f43e7a79fdb4ef95457bf29a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
80B
MD59e72659142381870c3c7dfe447d0e58e
SHA1ba27ed169d5af065dabde081179476beb7e11de2
SHA25672bab493c5583527591dd6599b3c902bade214399309b0d610907e33275b8dc2
SHA512b887eb30c09fa3c87945b83d8dbddceee286011a1582c10b5b3cc7a4731b7fa7cb3689cb61bfead385c95902cab397d0aa26bc26086d17ce414a4f40f0e16a01
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
114B
MD5e6cd92ad3b3ab9cb3d325f3c4b7559aa
SHA10704d57b52cf55674524a5278ed4f7ba1e19ca0c
SHA25663dfb8d99ce83b3ca282eb697dc76b17b4a48e4065fc7efafb77724739074a9d
SHA512172d5dc107757bb591b9a8ed7f2b48f22b5184d6537572d375801113e294febfbe39077c408e3a04c44e6072427cbe443c6614d205a5a4aa290101722e18f5e8
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
471B
MD53c64cdfd6fb45399a5aa93d32cafd1f0
SHA1e9d8b893c5d7de268c241c8e7904172d921b752f
SHA256cb14dcacdfef6bc1432983d6f16f7478252e7ef52196fbd105211ff72cb55de2
SHA5128a6d1ce22c45592639d2a9ef0b3dcd5fd3a50fd3bdba270f1b3d15c925dec7024c9607553901466460f5046f44b26b4636c8587d37af81ce8f6dec01b58a0550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D
Filesize471B
MD5e8c709d1ffa0076f2235294915859116
SHA16a11301333ef4b58e70416ca285755334f979382
SHA256383a551a728679e2ed6b3f6bc6c305bdb896b907ceb56e5f6272cba6e358deb0
SHA512c1fdc767e46b6e8b684afd7aa15fa709e7b63c6f0b57292973515f8a571a4986b701d782ec1cd9c5cb0c8f1767b13299e2aa63120fb8ccc82d2020858e0444d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\772D055D5E4421B179898A4E6FBD9ACC
Filesize400B
MD5143c9807623d550c34143f2cd9e0ca09
SHA1278ebeeb745876be0671facd258feb09828a3d71
SHA256088b46d014c67e3863f4c91a1d9614d3ed0e942e0ddd8c8e874d08aa30f97ced
SHA51242faf77c1c2aa1ed9eefc4863cc9bc4757c6731c28fe61516825aa794dc734a2486ca907aca8916c82d69777d283d7c9399cb1463ef34533a286b1a3946a873a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D14B79B440CDC26D7D21C81855E2C04D
Filesize404B
MD57693e645dd870c46887560a142b57e70
SHA1f1f3e5cf0790c6eeecf17124e66d57ab1a6ca349
SHA25619e496b20307ba47158b19843ba9dbaa17a59f085e5d590b65545048b61b3579
SHA512e14ca3e85eb4a1777a6e9857e8338eedbad8d8179b3bdc4692019c52bc44aaebd1711ff672c486c625054047c415e76887fadf75d76d081d58c73dba663cafeb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.14\autofill_bypass_cache_forms.json
Filesize175B
MD58060c129d08468ed3f3f3d09f13540ce
SHA1f979419a76d5abfc89007d91f35412420aeae611
SHA256b32bfdb89e35959aaf3e61ae58d0be1da94a12b6667e281c9567295efdd92f92
SHA51299d0d9c816a680d7c0a28845aab7e8f33084688b1f3be4845f9cca596384b7a0811b9586c86ba9152de54cafcdea5871a6febbee1d5b3df6c778cdcb66f42cfa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.14\edge_autofill_global_block_list.json
Filesize4KB
MD5afb6f8315b244d03b262d28e1c5f6fae
SHA1a92aaff896f4c07bdea5c5d0ab6fdb035e9ec71e
SHA256a3bcb682dd63c048cd9ca88c49100333651b4f50de43b60ec681de5f8208d742
SHA512d80e232da16f94a93cfe95339f0db4ff4f385e0aa2ba9cbd454e43666a915f8e730b615085b45cc7c029aa45803e5aca61b86e63dac0cf5f1128beed431f9df0
-
Filesize
509KB
MD5630f694f05bdfb788a9731d59b7a5bfe
SHA1689c0e95aaefcbaca002f4e60c51c3610d100b67
SHA256ad6fdee06aa37e3af6034af935f74b58c1933752478026ceeccf47dc506c8779
SHA5126ee64baab1af4551851dcef549b49ec1442aa0b67d2149ac9338dc1fe0082ee24f4611fcc76d6b8abeb828ad957a9fa847cbc9c98cdf42dd410d046686b3769b
-
Filesize
21KB
MD5846feb52bd6829102a780ec0da74ab04
SHA1dd98409b49f0cd1f9d0028962d7276860579fb54
SHA256124b7eeba31f0e3d9b842a62f3441204beb13fade81da38b854aecba0e03a5b4
SHA512c8759e675506ccc6aa9807798252c7e7c48a0ab31674609738617dc105cee38bce69d4d41d6b95e16731466880b386d35483cbeea6275773f7041ba6e305fae9
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
334B
MD52cc6c1b5b72e52ae81758e9b60a6aeeb
SHA199d6b4a2fe3f07379b6a44e05ee301e78078b130
SHA2566ed42503af0629b8393f31f0607434311e9217b03c93df71aaf5c12a042439c9
SHA51226e3e86a8401ff95144f23c05e365a207f2caa1ace0a25f078eade7014847e52e0938cc09a8db6b5fc6f990c1468a48e03b7f9dff616ae3b4cd05933b6bb4a3c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD50afd51938a539cb9c96e0491b551cd8f
SHA166727866acd43f9cd7af8a613b0e1992952d5ede
SHA2563908d756e505770e55f8c9fbfbff527f7173f40471fc6f9fc23da793fe47f462
SHA5122fe6318fbfd3e88bc4b67abc56876e81922e78a749b11b6ca295468c3b888b66e207691145324055778af7223e1b02ab86d9e1772f7c31bdf44519b9512ffee9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5d3730.TMP
Filesize3KB
MD56b7566068d28fa05d77b87786b39931f
SHA19a5e59cfaaab00129172b8a5dddb7ccafd3d089f
SHA2569769419ef08ac528256872e113d805988d43b3e632e00955c1ec1a584a9161bc
SHA512e0de9068d633d87bd198916efda0d75f2fd477c7b04d0e75bc4ff783c4fb8e0baa374ab0cadcbdde42ec98f3519b590183d2042c42c3c43f4a669f10e6edf9cb
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
3KB
MD52cef175d3f9cb9da8a3afc04bba1d550
SHA1012f477efd5a793cd399d7c88736ecbcf889a3bf
SHA256f50bc0aed86b0a1d6c5b18bc1de53a651a499e18a4d8d6419e665622ce6ff5a0
SHA51275c626fce3c9aa8b495e10df089b28830fd3387a410d71b490833dd89824a29edc6287a9647e6bc471f802dceadf48f53662a5ced92bd1431e461e023cd39d26
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD549847e2746e66c92d1f30690c4f6fd13
SHA1e5a9084fd50cf0a74abfecbbf934f74d2119997a
SHA25651ba39ed87d3eb2e704b4d8839752ab160426a627e6a77a178a5e52be492473e
SHA5127d326065628e71f75b4011c52383a628f1295e1916a56e319e1408b163f65b93dd1973081f409423668dbd72052a2da6f8d73501a29eab22e8c6577a8ad6715e
-
Filesize
3KB
MD55fa11e79bfb17d4e54b4472050a8ee84
SHA159bc68f15400bae201b4e69e5a28fb9bec48edcf
SHA256433c04250a1c18b50e854d6226e5b17874e960ab120983425d3b4c0730f6d852
SHA51284f3c69706401d1786db70c508a8bc8a328efefdc1e4114a4ec49577e515bf1307172409f1963e3719ecf53acee899dfb9c8e75f21e619687c94cff5fc2f0509
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD59133c08af4bc00608ba6359e3a290050
SHA1e77e57a7ef79996e3825389ab417be363f22dffb
SHA256d1466c2bd02d43c78866fa6ac73184b1bb9d82cee3aa881220fe2ac6b7a0adc9
SHA512de06a5a491f347662de2b9882722b78f4ef43f3e34800cd9d23eb523e46002bae1cc7c84dccc81ea855653d46e67e1a100d97e9a005412fe4498c36118a7f8a6
-
Filesize
15KB
MD540ea9dba19578ade17ec94704561dbc2
SHA184bb10ebadd0996875d9d42c103121dbae193d82
SHA256110b5af0618dafe12d8bd3d80b513a997ed0c8868f9b90a3b17070e8cff870aa
SHA5128463373c14536f1e6d5995b5fcda2521dee2d01c2f60060e92b2df8a069af23f1b225e59866c8f16b0c474816793a135e4ff445692e13ae1e091eddf7ef570f7
-
Filesize
14KB
MD5e1b9779730ed04d3bd77ddf6e65614be
SHA1bb75182700f127b8baeab21a609af1e0b059cf97
SHA256185313c51c191236d86ae1ddce5d2c762d741afd93ad7ccb8410b712a692ca6a
SHA5128a730e98c54153502e406c37ca4d46a92daf25feb79f957ac80f7c49e6f7bc30a87003fe9c9e19c842de39105dc211ddd59b2e729bbdb576e134d860c39c4ffe
-
Filesize
36KB
MD5513f3de4a6dddf35cc11dc8a6c6b6e68
SHA1dee29f29d60da67e364ecd206e4df0537db692f2
SHA256446eeb3970b197405a3cdea1a0dc9526228ae3e0d0a1bf0973ef295ef10e02d3
SHA51295bbaa59eebe342f9c2d82d28b6a575226f650b1a4f49e649f4b0b5e337517e1146b1a9578434a045cfd81987f5f1906b9bb3b2cce0b15dcbd0ec45e6ddd8aaa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index
Filesize744B
MD57382bac3d5cdf052304bbeff3f1020ba
SHA17d501d9bfd1cc789a9245f59c6d943b1482c9cc3
SHA2563caee5ac88f62161435779567f5048528073f67246c5cf4eb89cbaa3d8891925
SHA51275582fe47e4b4fb7ce025f6b2ff73e0538af6e28630e1605cb4df0abf10b4c31842da2d9ab8a7d371115448e012cbfd171965388d4c9d972cb6e703d372da711
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index~RFe616996.TMP
Filesize744B
MD5bc0823c5ae56d5d02cc137cf79317b0c
SHA179cac1c1e0f3af0b4da5e38b9a55c8065831b52d
SHA25640b9d5f669f8afe6aafed2f028ce6221af619f43b5b003b4dfce9567e88bd036
SHA5122e6f7bfe54adb13818865216794c029b536bd5508189052b5c08256532b9a1a94c6e9b57d99102a71e7b9fa2763c2503ff2d97aa96d5a591a650fde878133aa5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize253B
MD5bf642fed908b1b1cb4c23cdabf00fcc3
SHA1d31248962fc66033dde5e0c8b6618b156d53049e
SHA25637d38d1a69a38f2a4068786347e353eec49f4f3cd1c493c5a4b34d2251ca11db
SHA512a73d8b72abd8e498ca2604114c8a9dba90783fda7d5180490598e70b98e28ce54310613ec123dcb4b993cceb82fd8cc93545893c5cbfc35fa1edee5938d1387c
-
Filesize
4KB
MD58e46ba596ae08aa37c38610c9822eb6d
SHA10cab95a19eb926ae48c36f2c0d12f67bd379b7bf
SHA256bb93d75a069b141712f4235981467723c8dfa9c969d506132e37b66df00d9e12
SHA512e8e2407937264a58b6f2ee51b378bc2f6ba61250dd71f3925134bdb876e4084ef684fdff252bf7f8027d25bb1d0a3116276352d815170f620f24e0df5f5c249c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\45cb7a8a-d572-425e-b8c9-54231378cb54.tmp
Filesize21KB
MD5ffc925535caded892ef37b85920320da
SHA109620117e3027e1382c34d25da5fecc380605675
SHA2563bd716b1f9c048085aa4e66db8b11f28ece94e04d74de365c9de5a1ce30a0678
SHA5126ebb82138c89e5bce0725171f9bee7d7f0daf6a1953eecbdf9400569a53125a4b9a01ff0d8f2357db3c9c76bcc82ab4b788090031844bd578b319139e32b500a
-
Filesize
876B
MD5b2e20b47d5638c2276a5d1f4b813da84
SHA12eb8dde70d46fd967b2b796ccfa1ee0ccc329055
SHA2565ad12ab16747965d0142d361d47f8d2f531a4d26c9d28334f0fc0e85aca3b6f8
SHA5120e81d1b640fb4dc1f2a16cff23d666753efe168603d5933d344ef4e60b797367a8b1751ff6fd94b4b1ab0662ddb02ba5dad1e6643bf0a17a4d88fc9201d9976f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe5da7fb.TMP
Filesize467B
MD5d1a775870237518b79558348c2d42b14
SHA167f1f9efcf00a0b3c8490d7cf21246b670620e41
SHA2561c5d487bcc2f303ad907ab732cbd0423e989984d5ee491cd3aad8d52f69a4a0e
SHA512693a65606106285d255fc1e9cffb5d75463b11b4b244b323c3e609b03eb74197853fe1c9cf04f881a861ee16f966e0a44817c8c8dcd20f0763511d770137de92
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\a59022a9-8ad6-4f74-bb7a-e71a5f1a011d.tmp
Filesize20KB
MD5622cf13abe8c4ba81acbbe4070f8d70a
SHA129c39577de789602617632a1ee745e5897805fa7
SHA256b91863cb7dfb695e04f8be6b437f67ba669d1cfbd407a3418cccf12919c7dab4
SHA51225d382c5ef4691018d62f05e28a6d2c321218e1586646b2e628350968f2475d30a13c53c5055bea16451111b1c566e53003af3e2afe3a9e5a3785255069c23f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD5146e4e9982159ff60630e5e63acf8afa
SHA17ca43bc3ded7a4b40a2fb71eb800e08b0f759b5f
SHA2561b231e02b82056649df5d8d2fb168a5d8061a4ddc5f020ac16f217db1202e251
SHA51280d397da222342421780a04ecb8e1b775485cf768b0e289cd9dc9dd5c3c75f21766384ccf65c693c501b16fa02ca8af61eeebb1de09e4bbd98f40d606c4d9c99
-
Filesize
39KB
MD5ff94a5e0d236b132bcd6702dbb9563f0
SHA19ab36094acf4ba87d8e4235b83dd5eb2faa5e461
SHA2561a60c7effeee1fc645f9f2bd8f10ba4759901b69be094faa055a743521f24299
SHA5123c63980c7990180c5619bcf1460eafa886c7d069ae3f9567a45bf0ff6ba2bbae14dfb2da8433ba6bbce25ea9e7e99d614a958275a0848c2526009538bd414148
-
Filesize
6KB
MD5c008bdc34874f58623a234b0352bff7f
SHA11cca928eff88c572e43b290026154fcd52f507f0
SHA2569106e2f7b98814465d36727d097efc4616086a42867d1c7d2ca67d899905b68f
SHA5121e40c749f86e4987173358ca45b65331416a591f4a98e1daf5331a10dee8614e4801e15bef26502ce5d713654839cfecf3fc11a6f694ee5ebfa6dc55a2bc154f
-
Filesize
7KB
MD5788fbbefc2451cbe2d3c6d4cef57dd03
SHA1a8d9c8cf6df159e35a56f5eca3a99aa23b51ba79
SHA256143f971e8e6dd9e9fd36a0dde0e2ce44d11ea3301cda6bb4c69c1c7da56115db
SHA51254d895b8b9a6358e1034fda9c031a623c128e97f1d338d7f270a4f13f0b7c33af8fe3e5549c48ab4e60302cb4a5fe582c4015db7c8e44470425bad7dcf692681
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2024.12.14.1\keys.json
Filesize6KB
MD5b4434830c4bd318dba6bd8cc29c9f023
SHA1a0f238822610c70cdf22fe08c8c4bc185cbec61e
SHA256272e290d97184d1ac0f4e4799893cb503fba8ed6c8c503767e70458cbda32070
SHA512f2549945965757488ecd07e46249e426525c8fe771f9939f009819183ab909d1e79cbb3aeca4f937e799556b83e891bbb0858b60f31ec7e8d2d8fbb4cb00b335
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5fe6432fb960deb298e1277dcf5b3b8f2
SHA1d92dc2d9333ff1b570c5e98fe509b55e9e3394fe
SHA2568595a55b9dc7b1da7ecb8c0bbed5342472a062da767f5dfa38978b1c9bb7d3e4
SHA512e115c848460718da7fc8d036bfc387b18802cf18626bd1a4f2136f22b0945e9a03fc1e87248409cde02bd56fad77dd307354e3716906905c13794f2163728bd6
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3912_1584068872\7071fb59-9f57-4cda-b6d4-8383e6baacbe.tmp
Filesize10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
130KB
MD50cb589dda71f16ed3e788985705d654d
SHA1d7544de2a75a14e2677f89142e684a90019aad77
SHA2560edf9cc62c66f91eef4ff01848f9324999df945cc1d1d41c3fd6dfe075f6e49a
SHA512e4f2649071432f46f3e12491c36d906cfd5aed506cf9cba3bfcb45f826d0afdd207f99901491adea6128bde223439aaee2b5e63c22ac6ed9a15eb018a9e01872